|
Search the dblp DataBase
Myong H. Kang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Myong H. Kang, Ira S. Moskowitz
A Pump for Rapid, Reliable, Secure Communication. [Citation Graph (1, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:119-129 [Conf]
- Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:143-0 [Conf]
- Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:91-100 [Conf]
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:194-204 [Conf]
- Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:352-360 [Conf]
- Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese
A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP] ACSAC, 1996, pp:32-43 [Conf]
- Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys Kochut, John A. Miller
A Multilevel Secure Workflow Management System. [Citation Graph (0, 0)][DBLP] CAiSE, 1999, pp:271-285 [Conf]
- Oliver Costich, Myong H. Kang
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture. [Citation Graph (0, 0)][DBLP] DBSec, 1993, pp:329-355 [Conf]
- Oliver Costich, Myong H. Kang, Judith N. Froscher
The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP] DBSec, 1994, pp:97-110 [Conf]
- Myong H. Kang, Oliver Costich, Judith N. Froscher
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:285-300 [Conf]
- Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:161-174 [Conf]
- Ira S. Moskowitz, Myong H. Kang
The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:61-75 [Conf]
- Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:135-149 [Conf]
- Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP] HASE, 1996, pp:198-205 [Conf]
- Jim Luo, Bruce E. Montrose, Anya Kim, Amitabh Khashnobish, Myong H. Kang
Adding OWL-S Support to the Existing UDDI Infrastructure. [Citation Graph (0, 0)][DBLP] ICWS, 2006, pp:153-162 [Conf]
- Anya Kim, Amitabh Khashnobish, Myong Kang
An Architecture for Web Services Authentication and Authorization in a Maritime Environment. [Citation Graph (0, 0)][DBLP] ITNG, 2007, pp:451-456 [Conf]
- Myong H. Kang, Oliver Costich, Judith N. Froscher
Using Object Modeling Techniques to Design MLS Data Models. [Citation Graph (0, 0)][DBLP] Security for Object-Oriented Systems, 1993, pp:203-211 [Conf]
- Anya Kim, Jim Luo, Myong H. Kang
Security Ontology for Annotating Resources. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2005, pp:1483-1499 [Conf]
- Jim Luo, Bruce E. Montrose, Myong H. Kang
An Approach for Semantic Query Processing with UDDI. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2005, pp:89-98 [Conf]
- Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
- Myong H. Kang, Joon S. Park, Judith N. Froscher
Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:66-74 [Conf]
- Joon S. Park, Myong H. Kang, Judith N. Froscher
A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:167-182 [Conf]
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
- Myong H. Kang, Judith N. Froscher
A Framework for Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP] WETICE, 2000, pp:219-220 [Conf]
- Myong H. Kang, Judith N. Froscher
A Tool for Secure Inter-Organizational Computing. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:194-199 [Conf]
- Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz
Design and Assurance Strategy for the NRL Pump. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:4, pp:56-64 [Journal]
- Myong H. Kang, Henry G. Dietz, Bharat K. Bhargava
Multiple-Query Optimization at Algorithm-Level. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1994, v:14, n:1, pp:57-75 [Journal]
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal]
- Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee
A Network Pump. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:329-338 [Journal]
A Peer-to-Peer Federated Authentication System. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|